General
-
Target
Homsa.apk
-
Size
8.6MB
-
Sample
240522-pf8glaaa59
-
MD5
0ace9f345bcdd194048827f2c3deaaf1
-
SHA1
7382f7d075afba92e586c89e82de42f32b6d5d47
-
SHA256
cd02acb157e57ca60729f5fba8e4820a6601ec5ca438b11df195be471efc1220
-
SHA512
ac6c55b271d5574ee10de1667a2ec7041b0cd184a41a606faa3681136f54ab48bac1f17cddd5f90bdecd25e2ca992193860ac13dc077da282806cc137b39bc53
-
SSDEEP
196608:5nOR5bq9vreDeWo8SgaJo3MPGwXcdwE/Qsjx9sY8zN9da7a:VOXW9vKeWodgaJEMHOwEzjx8zDs+
Static task
static1
Behavioral task
behavioral1
Sample
Homsa.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Targets
-
-
Target
Homsa.apk
-
Size
8.6MB
-
MD5
0ace9f345bcdd194048827f2c3deaaf1
-
SHA1
7382f7d075afba92e586c89e82de42f32b6d5d47
-
SHA256
cd02acb157e57ca60729f5fba8e4820a6601ec5ca438b11df195be471efc1220
-
SHA512
ac6c55b271d5574ee10de1667a2ec7041b0cd184a41a606faa3681136f54ab48bac1f17cddd5f90bdecd25e2ca992193860ac13dc077da282806cc137b39bc53
-
SSDEEP
196608:5nOR5bq9vreDeWo8SgaJo3MPGwXcdwE/Qsjx9sY8zN9da7a:VOXW9vKeWodgaJEMHOwEzjx8zDs+
-
Checks if the Android device is rooted.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
Schedules tasks to execute at a specified time
Application may abuse the framework's APIs to perform task scheduling for initial or recurring execution of malicious code.
-